tag:blogger.com,1999:blog-49214358603771324702018-08-14T13:56:16.151-07:00TechDrTech Drivehttp://www.blogger.com/profile/08412059101754483278noreply@blogger.comBlogger2693125tag:blogger.com,1999:blog-4921435860377132470.post-80193780303450991402018-08-14T13:56:00.001-07:002018-08-14T13:56:15.776-07:00Tinder co-founders sue parent company for $2 billion over deception<div><img src="https://o.aolcdn.com/images/dims?thumbnail=1200%2C630&amp;quality=80&amp;image_uri=https%3A%2F%2Fo.aolcdn.com%2Fimages%2Fdims%3Fcrop%3D4500%252C3000%252C0%252C0%26quality%3D85%26format%3Djpg%26resize%3D1600%252C1067%26image_uri%3Dhttp%253A%252F%252Fo.aolcdn.com%252Fhss%252Fstorage%252Fmidas%252Fb98d8cfd72a53d1c56f60634e3bf8300%252F206594157%252Ftinder-logo-can-be-seen-on-a-mobile-phone-in-new-delhi-india-on-26-picture-id1005679568%26client%3Da1acac3e1b3290917d92%26signature%3D857252b08f2101db8dde6a1d08875dd007df730b&amp;client=amp-blogside-v2&amp;signature=7f4e83537211ec7aa40f7f525416d5024d8803f7" class="ff-og-image-inserted" /></div><p>The complaint explains that Tinder was supposed to be valued in 2017, 2018, 2020 and 2021; On those days, employees should have been able to exercise their stock options. Instead, the lawsuit alleges that parent company IAC/Match Group inaccurately lowballed Tinder’s valuation in July 2017 at $3 billion, the same as it did two years ago despite the dating app’s substantial growth. Then, the parent company secretly merged Tinder into Match Group, which meant employees earned far less in stock options. Then, IAC threatened to terminate anyone who revealed how much the company was actually worth, the lawsuit claims.</p><p>Tinder co-founders Sean Rad, Justin Mateen and Jonathan Badeen, three current executives and four other former execs are named on the lawsuit. It further alleges that interim Tinder CEO Greg Blatt, who had replaced Rad, sexually harassed the company’s vice president of marketing and communications, Rosette Pambakian, during a company holiday party in 2016. The suit claims the incident was covered up because Blatt was spearheading the aforementioned scheme to produce an artificially low valuation of Tinder.</p><p>The suit cites last week’s SEC-mandated IAC/Match Group <a href="https://www.barrons.com/articles/its-too-soon-to-jilt-match-group-1534171994">earnings</a> call, which noted Tinder is on track to hit $800 million in revenue thanks to premium services like Tinder Plus and the subscription-based Tinder Gold, which give users bonus features and privileges. That prediction is 75 percent higher than what IAC/Match projected when it absorbed Tinder last year, the complaint alleged.</p><p>We’ve reached out to Tinder and its parent company for comment and will update when we hear back. IAC and Match Group <a href="https://www.wsj.com/articles/match-group-and-iac-face-lawsuit-over-tinders-valuation-1534263439">provided</a> a joint statement to <em>The Wall Street Journal</em> that read:</p><p>“Since Tinder’s inception, Match Group has paid out in excess of a billion dollars in equity compensation to Tinder’s founders and employees. With respect to the matters alleged in the complaint, the facts are simple: Match Group and the plaintiffs went through a rigorous, contractually defined valuation process involving two independent global investment banks, and Mr. Rad and his merry band of plaintiffs did not like the outcome.”</p> TechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-75239954236519026352018-08-14T12:53:00.007-07:002018-08-14T12:53:18.053-07:00Analysts: Trade Wars Not Good for Anyone<div><img src="https://gdb.voanews.com/a27ff962-4d89-4371-b931-8628fc3c9c63_tv_w1200_r1_s.jpg" class="ff-og-image-inserted"/></div><br/><p>Tariffs imposed on goods imported from China, Europe and other parts of the world could hurt American consumers and small businesses more than help them. Analysts point out that in today&#8217;s global economy, most manufacturers produce parts and import others to make a final product. Tariffs imposed on Chinese electronic parts have already forced a U.S. TV factory to close down, and there are concerns that U.S. farmers could lose big markets overseas. VOA&#8217;s Zlatica Hoke has more.</p>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-75536620150567987152018-08-14T12:53:00.005-07:002018-08-14T12:53:16.257-07:00White House, Omarosa, and Security Worries Over Secret Tapes<div><img src="https://gdb.voanews.com/a233134b-67ff-4e25-bb82-65a0ba4b5953_tv_w1200_r1_s.jpg" class="ff-og-image-inserted"/></div><br/><p>The scandal is continuing between President Donald Trump and former aide and reality-show star Omarosa Manigault Newman who is going public with recordings of conversations she had with the president and his chief of staff. Manigault Newman says she secretly recorded the audio, raising questions about possible security breaches at the White House. VOA White House correspondent Patsy Widakuswara has the latest.</p>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-74417571957092802382018-08-14T12:53:00.003-07:002018-08-14T12:53:13.915-07:00Survey: Vienna Tops Melbourne as World's Most Liveable City<div class="wsw"><br/><span class="dateline">VIENNA &#8212;&#160;</span><br/><p>Vienna has dislodged Melbourne for the first time at the top of the Economist Intelligence Unit&#8217;s Global Liveability Index, strengthening the Austrian capital&#8217;s claim to being the world&#8217;s most pleasant city to live in.</p><br/><p>The two metropolises have been neck and neck in the annual survey of 140 urban centers for years, with Melbourne clinching the title for the past seven editions. This year, a downgraded threat of militant attacks in western Europe as well as the city&#8217;s low crime rate helped nudge Vienna into first place.</p><br/><p>Vienna regularly tops a larger ranking of cities by quality of life compiled by consulting firm Mercer. It is the first time it has topped the EIU survey, which began in its current form in 2004.</p><br/><p>At the other end of the table, Damascus retained last place, followed by the Bangladeshi capital Dhaka, and Lagos in Nigeria.</p><br/><p>The survey does not include several of the world&#8217;s most dangerous capitals, such as Baghdad and Kabul.</p><br/><p>&#8220;While in the past couple of years cities in Europe were affected by the spreading perceived threat of terrorism in the region, which caused heightened security measures, the past year has seen a return to normalcy,&#8221; the EIU said in a statement about the report published on Tuesday.</p><br/><div class="wsw__embed"><br/><figure class="media-image js-media-expand"><div class="img-wrap"><br/><div class="thumb"><br/><img alt="FILE - A housing development area is seen with the Melbourne, Australia, skyline in the distance, June 2, 2010." src="https://gdb.voanews.com/A1632705-9149-4ED3-BA64-257445417C3E_w250_r0_s.jpg"/></div><br/> </div><figcaption><span class="caption">FILE &#8211; A housing development area is seen with the Melbourne, Australia, skyline in the distance, June 2, 2010.</span><br/></figcaption></figure></div><br/><p>&#8220;A long-running contender to the title, Vienna has succeeded in displacing Melbourne from the top spot due to increases in the Austrian capital&#8217;s stability category ratings,&#8221; it said, referring to one of the index&#8217;s five headline components.</p><br/><p>Vienna and Melbourne scored maximum points in the healthcare, education and infrastructure categories. But while Melbourne extended its lead in the culture and environment component, that was outweighed by Vienna&#8217;s improved stability ranking.</p><br/><p>Osaka, Calgary and Sydney completed the top five in the survey, which the EIU says tends to favor medium-sized cities in wealthy countries, often with relatively low population densities. Much larger and more crowded cities tend to have higher crime rates and more strained infrastructure, it said.</p><br/><p>London for instance ranks 48th.</p><br/><p>Vienna, once the capital of a large empire rather than today&#8217;s small Alpine republic, has yet to match its pre-World War I population of 2.1 million. Its many green spaces include lakes with popular beaches and vineyards with sweeping views of the capital. Public transport is cheap and efficient.</p><br/><div class="wsw__embed"><br/><figure class="media-image js-media-expand"><div class="img-wrap"><br/><div class="thumb"><br/><img alt="A traditional Fiaker horse carriage passes Burgtheater theatre in Vienna, Austria, Aug. 13, 2018." src="https://gdb.voanews.com/FDA69363-3B61-4244-AA91-5DC72DB039A8_w250_r0_s.jpg"/></div><br/> </div><figcaption><span class="caption">A traditional Fiaker horse carriage passes Burgtheater theatre in Vienna, Austria, Aug. 13, 2018.</span><br/></figcaption></figure></div><br/><p>In addition to the generally improved security outlook for western Europe, Vienna benefited from its low crime rate, the survey&#8217;s editor Roxana Slavcheva said.</p><br/><p>&#8220;One of the sub-categories that Vienna does really well in is the prevalence of petty crime &#8230; It&#8217;s proven to be one of the safest cities in Europe,&#8221; she said.</p><br/></div>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-51832588461697051852018-08-14T12:53:00.001-07:002018-08-14T12:53:11.486-07:00Bill Asks Pentagon to Examine More Options for Stopping N. Korean Missiles<div class="wsw"><br/><p>A bill signed by President Donald Trump on Monday asks the Pentagon to pursue more options for defeating U.S.-bound North Korean missiles by using radar and more missiles to spot and shoot down inbound threats.</p><br/><p>The National Defense Authorization Act gives the Pentagon $716 billion, with almost $10 billion going to the Missile Defense Agency to fund the expansion of missile defenses, emphasizing the need to stop any North Korean or Iranian attacks.</p><br/><p>The military is already exploring whether the United States can add another layer to defenses to those already in place for intercepting incoming missiles in flight, Keith Englander, the U.S. Missile Defense Agency&#8217;s director for engineering, said at the Space and Missile Defense Symposium in Huntsville, Alabama, last week.</p><br/><p>The Missile Defense Agency&#8217;s head, Lieutenant General Samuel Greaves, has said he wants to integrate the Aegis Combat System into the current ICBM defenses of the U.S. homeland. The Aegis system, mainly found on ships, could be fitted with the Standard Missile 3 Block IIA (SM-3 IIA) interceptors that are being developed in a joint venture between Raytheon Co and Japan&#8217;s Mitsubishi Heavy Industries Ltd.</p><br/><div class="wsw__embed"><br/><figure class="media-image js-media-expand"><div class="img-wrap"><br/><div class="thumb"><br/><img alt="FILE - The USS Mason, which carries an array of advanced weaponry, including the Aegis anti-air warfare missile system, arrives at Port Canaveral, Florida, April 4, 2003." src="https://gdb.voanews.com/624F8558-635D-4ED7-B4E7-29F3591E22D0_w250_r0_s.jpg"/></div><br/> </div><figcaption><span class="caption">FILE &#8211; The USS Mason, which carries an array of advanced weaponry, including the Aegis anti-air warfare missile system, arrives at Port Canaveral, Florida, April 4, 2003.</span><br/></figcaption></figure></div><br/><p>The Lockheed Martin-made Aegis system is currently deployed aboard 36 U.S. Navy ships, as well as at the Pacific Missile Range Facility on Hawaii.</p><br/><p>If given the new mission, the ships could patrol the Pacific Ocean and augment the network of Ground-Based Midcourse Defense interceptor missiles in Alaska and California that protect the nation from intercontinental ballistic missile (ICBM) attacks.</p><br/><p>This is one of several avenues the Pentagon is studying to knock down inbound missiles. These include shooting the missile down soon after takeoff, stopping it in space as it flies above the Earth&#8217;s atmosphere, and killing it soon after it re-enters the atmosphere before hitting its target.</p><br/><p><strong>Growing concern</strong></p><br/><p>Concern about U.S. missile defenses has grown with the escalating threat from North Korea. Last year, North Korea conducted about a dozen missile tests, including the launch of a suspected ICBM that could hit the U.S. mainland and the test of a purported hydrogen bomb.</p><br/><p>North Korea and the United States are struggling to agree on how to bring about the North&#8217;s denuclearization, after Kim vowed to work toward that goal at a landmark summit in June in Singapore with Trump.</p><br/><p>The potential new defenses must first be tested to make sure the intercepting missile can take out what could be an ICBM fired by Pyongyang.</p><br/><p>In a previous spending bill, Congress mandated that the Missile Defense Agency perform an intercept test with the SM-3 IIA missile against an ICBM by the end of 2020.</p><br/><p>Last year, Reuters reported that the Pentagon was investigating adding a missile defense layer under the Ground-Based Midcourse Defense system.</p><br/><p>In May 2017, the Missile Defense Agency held its first live-fire test of the Ground-Based Midcourse Defense against a simulated ICBM, and hailed the successful intercept as an &#8220;incredible accomplishment.&#8221;</p><br/></div>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-6602558952803313542018-08-14T11:33:00.003-07:002018-08-14T11:33:51.141-07:00US government employees will not be allowed to use Huawei & ZTE devices<div><img src="https://www.xda-developers.com/files/2018/08/US_Flag_Backlit.jpg" class="ff-og-image-inserted"/></div><br/><div><br/><p class="dropcap">Following the <a href="https://www.xda-developers.com/zte-return-to-business-company-signs-agreement-us-government/">resurrection of ZTE</a> after their <a href="https://www.xda-developers.com/zte-1-billion-us-government-trade-ban/">near collapse</a>, the company is not out of the water yet. We saw Texan Republican Michael Conaway <a href="https://www.xda-developers.com/us-government-agencies-huawei-zte-devices/">propose a bill earlier this year</a> which would effectively ban US Government Employees (and contractors) from using Huawei and ZTE devices. That bill has since been signed by President Donald Trump as a component of the Defense Authorization Act. This is seen as a compromise after the Senate <a href="https://www.xda-developers.com/zte-return-to-business-company-signs-agreement-us-government/">did not want to lift the ban on ZTE</a>.</p><br/><p>The ban effectively means that Huawei and ZTE devices can no longer be used as part of components or services deemed an &#8220;essential component&#8221; or &#8220;critical technology&#8221; to the system that they&#8217;re being used in. That does mean they can be used seldom throughout operations, but for the most part, can&#8217;t be involved. That is so long as they can&#8217;t view any critical data, however. Funding will also be provided by several government agencies to businesses which may need to replace their technology that makes use of Huawei or ZTE components.</p><br/><p>In a statement to&#160;<em>The Verge</em>, Huawei called the ban a &#8220;random addition&#8221; that was &#8220;ineffective, misguided, and unconstitutional.&#8221; They did not say whether they will challenge the law or not, however. They did say it will increase costs for both consumers and businesses alike. Huawei and ZTE have both been targets of the US for years, with the former even being suspected of <a href="https://www.xda-developers.com/huawei-investigation-us-sanctions-iran/">breaking the same trade bans</a> as the latter. US lawmakers even pushed for AT&#38;T to<a href="https://www.xda-developers.com/lawmakers-pushing-att-cut-ties-huawei-phones-5g/"> drop their deal to launch a 5G network in the US together</a>. The <a href="https://forum.xda-developers.com/mate-10">Huawei Mate 10 Pro</a> was meant to arrive with AT&#38;T even before that, but was nixed last minute thanks to &#8220;<a href="https://www.xda-developers.com/huawei-mate-10-pro-coming-u-s-but-not-att/">political pressure</a>.&#8221; It&#8217;s been a rough and bumpy road for both of these companies.</p><br/><p>This is more likely to hurt ZTE than Huawei, though. Huawei is the second largest phone manufacturer in the world, and US government employees are simply a drop in the ocean compared to the larger global market. ZTE being the smaller player has much more to lose, but regardless, still finds itself in a better position than it was earlier this year.</p><br/><hr/><a href="https://www.theverge.com/2018/8/13/17686310/huawei-zte-us-government-contractor-ban-trump" class="btn btn_" target="_self">Via: The Verge</a><br/> </div><br/><p>Want more posts like this delivered to your inbox? Enter your email to be subscribed to our newsletter.</p>SocialDr.http://www.blogger.com/profile/10319745996298175752noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-68552469998226100712018-08-14T11:33:00.001-07:002018-08-14T11:33:44.255-07:00Top 10 Apps Every Salesperson Should Have<div dir="ltr"><br/><div><br/><div class="separator"><br/><a href="https://2.bp.blogspot.com/-Bd9piQac7Ug/WoViKtP83yI/AAAAAAAAA7k/AErWy5IaEvoQyRWqv5fP3en7gTgpkHULACLcBGAs/s1600/Business%2BApp.png"><img alt="Top 10 Apps Every Salesperson Should Have" src="https://2.bp.blogspot.com/-Bd9piQac7Ug/WoViKtP83yI/AAAAAAAAA7k/AErWy5IaEvoQyRWqv5fP3en7gTgpkHULACLcBGAs/s1600/Business%2BApp.png" title="Top 10 Apps Every Salesperson Should Have"/></a></div><br/><h2><br/><span><span><br/></span></span></h2><br/><h2><br/><span><span>Top 10 Apps Every Salesperson Should Have</span></span></h2><br/><h3><br/><span><span>Sales in an on-go process. You have to deal with different clients, manage piles of tasks and emails, offer &#8216;on field&#8217; services, fly out for a presentation, and much more.&#160;</span></span></h3><br/><p><span><br/></span><span>In between these tasks, it is possible that you feel lost, lonely and might miss out some important deadlines. But thanks to the emerging technologies and abundance of mobile applications, it is easier for the sales reps to work effectively. With the right mobile apps installed in your phones, you can reach the right clients, communicate with them, <a href="https://appinventiv.com/blog/mobile-technology-transforming-business/" rel="nofollow" target="_blank"><span>showcase your brand to valuable clients or esteemed customers</span></a>, close the deals, earn profits and become a better salesperson.&#160;</span></p></div><br/><div><br/><span><br/></span><span>Following are the top 10 sales mobile applications that I find useful for all those hoping for a brighter future in the sales and marketing:</span><span><br/></span><span><br/></span><br/><h3><br/><span><b><span>10 Apps to Streamline Your Sales Process</span></b></span></h3><br/><p><span><br/></span></p></div><br/><div><br/><span><b>1. <a href="https://wunderlist.com/" rel="nofollow" target="_blank"><span>Wunderlist</span></a></b></span><span><br/></span><span>Wunderlist is the best cloud-based app for salespersons to manage their tasks. You can add files, organize tasks, allocate tasks (or sub-tasks) to others, share files with colleagues and others, set due-dates and get a reminder of the same, add comments and hashtags for ease, and much more.</span><br/><span><br/></span><br/><span>With this mobile application, you can work effectively without getting confused what to do first, or skip any important assigned task. The app reminds you about the task scheduled and empower you to get it done before the due date. This way, you can ensure that your &#8216;To-do List&#8221; always remain checked (no task missed/left out).</span><span><br/></span><span><br/></span><br/><h4><br/><span><b>2. <a href="https://evernote.com/" rel="nofollow" target="_blank"><span>Evernote</span></a></b></span></h4><br/><p><span>It is a must-have tool for salespeople to remain organized all the time. The mobile app is available on different platforms and empowers you to take a note and share it from any part of the world. You can add links, tables, checklists, audio recordings as well as attachments in the notes &#8211; thus, collect all the required information/details for completing a task. Not just this, you can even convert notes into presentations to get ready for the unexpected meetings.</span><span><br/></span><span><br/></span></p><br/><h4><br/><span><b>3. <a href="https://linkedin.com/" rel="nofollow" target="_blank"><span>LinkedIn</span></a></b></span></h4><br/><p><span>LinkedIn app is not just useful for job seekers and recruiters, it is also a perfect tool for salespeople to reach the right clients, communicate and drive sales. </span><span>With the app, you can search for potential users based on the appropriate keyword. You can go through their profile and glean the useful details; and thus, connect with reputed and trusted professionals only.</span><br/><span><br/></span><span>Besides, you can use the app to keep a track of industry trends, understand the pain points of customers and make a marketing strategy accordingly. In other words, you can find and pitch the potential sales in the most profitable manner using the LinkedIn app.</span><span><br/></span><span><br/></span></p><br/><h4><br/><span><b>4. <a href="https://play.google.com/store/apps/details?id=com.google.android.googlequicksearchbox&#38;hl=en" rel="nofollow" target="_blank"><span>Google Apps</span></a></b></span></h4><br/><p><span>&#8216;Google Apps for Work&#8217; is ultimate set of tools for the sales rep. The application offers you with a professional email, which is the basic need of a salesperson. The app enables you to communicate each other through Gmail, Google + and Hangouts. </span><br/><span><br/></span><br/><span>You can sync all their tasks in Google calendar. You can create, store and share all kind of files (documents, presentations, excel sheets, forms, etc.) in Google Drive and much more. With Google Apps for Work apps in your mobile devices, you can remain in touch with anyone and have a F2F communication while sitting in the other corner of the world.</span><span><br/></span><span><br/></span></p><br/><h4><br/><b><span>5. </span><span><a href="https://basecamp.com/" rel="nofollow" target="_blank"><span>Basecamp</span></a></span></b></h4><br/><p><span>Basecamp app is a one-stop shop for all the management purposes. From discussing ideas to planning marketing campaigns and sharing files &#8211; the app is apt for your sales process.</span><span><br/></span><span>With this app, you can find all the projects assigned on the home screen, pin the important ones, make to-do lists, chat with others, stay updated with the recent activities and much more. The application offers a myriad of options/tools through which you can effectively work and add value to the business.</span><span><br/></span><span><br/></span></p><br/><h4><br/><span><b>6. <a href="http://www.theprofitstory.com/" rel="nofollow" target="_blank"><span>Profit Story</span></a></b></span></h4><br/><p><span>Profit Story application is a reliable tool for the salespeople to make calculations. With the help of this app, you can measure the selling price, gross profit margin, break-even percentage, markup percentage and this way, estimate the impact on price negotiation on their business. You can set default settings for regular data as well as email the results for additional analysis.</span><span><br/></span><span><br/></span></p><br/><h4><br/><span><b>7. <a href="http://handshake.com/" rel="nofollow" target="_blank"><span>Handshake</span></a></b></span></h4><br/><p><span>With Handshake app, the salespersons can better handle the remote field sales. Instead of travelling a hundred miles, you can showcase their brand services or products using 3D images, HD videos and digital catalogues. Besides, you can also employ barcode scanning feature to facilitate product information management.</span><span><br/></span><span><br/></span></p><br/><h4><br/><b><span>8. </span><span><a href="https://hubspot.com/" rel="nofollow" target="_blank"><span>HubSpot</span></a></span></b></h4><br/><p><span>HubSpot is another effective mobile CRM application that helps sales reps to convert leads on the go. The application notifies you about the new deals and sales activities, allows you to view and update the CRM task list, go through your CRM contact list and check the interaction history, track email performance and invest in better marketing strategies, etc.</span><span><br/></span><span><br/></span></p><br/><h4><br/><b><span>9. </span><span><a href="https://uber.com/" rel="nofollow" target="_blank"><span>Uber</span></a></span></b></h4><br/><p><span>Uber the best application for booking rides instantly. You need not wait for a taxi or meet an agent &#8211; With Uber app, you can get a cab at your desired location in a few minutes.</span></p></div><br/><div><br/><span><br/></span><span>As salespersons have to travel across the country for client meets, this app can help you in utilizing your time effectively. With the app, you can reach all the meetings on-time and the best part is that you can pay via credit card and other online payment methods; you need not suffer from the shortage of cash. This way, the Uber app can help you to be on-time everywhere and get their best shot.</span><span><br/></span><span><br/></span><br/><h4><br/><span><b>10. <a href="http://pocket.com/" rel="nofollow" target="_blank"><span>Pocket</span></a></b></span></h4><br/><p><span>Previously called Read It Later, the Pocket app is basically to save </span><span>the articles/blogs/videos/images to visit later. The mobile application is accessible both from phone and laptop, and also allow users to read the blogs in offline mode.&#160;</span><br/><span><br/></span><span>As a salesperson, you have to keep yourself updated with the recent news related to the market. You have to read a lot, and this application can help you in doing so. With the Pocket app, you can go through the saved content even while travelling or having dinner.&#160;</span><span><br/></span><span><br/></span><span>What are your favorite apps for sales? Share in the comment section below.</span></p></div><br/></div><br/><div id="author-box"><br/><div class="block-head"><br/><h3><br/>About<br/><br/>iGadgetware iGW<br/></h3><br/></div><br/><div class="post-listing"><br/><div class="author-description"><br/>A Social Media and Cyber Security Expert. Love to write about latest technology and Gadgets.<br/></div><br/></div><br/></div><br/><div id="related-posts"><br/><h2><br/><span><br/><br/>RELATED POSTS<br/></span><br/></h2><br/></div>SocialDr.http://www.blogger.com/profile/10319745996298175752noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-72410956869151362472018-08-14T10:46:00.001-07:002018-08-14T10:46:29.894-07:00Google Wages Internal War Over China Censorship Project<p></p><div class="post-content">&lt;!– CUSTOM <a href=""><img src="https://i2.wp.com/news.filehippo.com/wp-content/uploads/2018/08/Capture-3-642x425.png?resize=642%2C425&amp;ssl=1" alt="Google Wages Internal War Over China Censorship Project" title="Capture" data-recalc-dims="1" /></a><br />–&gt; <h2>Google prepares for return to China by building a censored search engine, much to some employees’ outrage.</h2><p>Google has been at work on a <a href="https://www.nytimes.com/2018/08/01/technology/china-google-censored-search-engine.html" target="_blank" rel="noopener">version of its search engine</a> that will meet the strict standards of the Chinese government, but new reports from the internet giant show that some of the employees aren’t too excited about Google’s new version.</p><p>The outrage from some employees is such that the company has revoked access to particulars of the project in an effort to quell the wildfire of internal gossip.<a href="https://i1.wp.com/news.filehippo.com/wp-content/uploads/2018/08/Capture-3.png?ssl=1"><img class="aligncenter size-full wp-image-32817" src="https://i1.wp.com/news.filehippo.com/wp-content/uploads/2018/08/Capture-3.png?resize=660%2C396&amp;ssl=1" alt="" width="660" height="396" data-recalc-dims="1" /></a>According to a report by&nbsp;<a href="https://theintercept.com/2018/08/03/google-search-engine-china-censorship-backlash/">Ryan Gallagher for The Intercept</a>, “Just a few hundred of Google’s massive 88,000-strong workforce had been briefed on the project prior to&nbsp;<a href="https://theintercept.com/2018/08/01/google-china-search-engine-censorship/">the revelations,</a> which triggered a wave of disquiet that spread through the internet giant’s offices across the world. Company managers responded by swiftly trying to shut down employees’ access to any documents that contained information about the China censorship project, according to Google insiders who witnessed the backlash.”</p><h3>What could possibly have Google employees so up in arms about a project that has been eight years in the making?</h3><p>The project, code named Dragonfly, is a highly censored version of the search engine based on extensive research into keywords used within the country, but that doesn’t seem to be the only thing upsetting employees. In addition to the company-mandated stab at their core values of making information access available to all, much of the anger stems from the hush-hush requirements and the lack of transparency within the country.</p><p>The backlash to this project, which was actually underway last year, has drawn criticism from not only the employees but even human rights advocates. The Chinese government has reportedly already seen the app in action, according to leaks from within Google, and the expected timeline for full launch was as early as six months from now. There’s no word whether the leaked information and the reports of blowback from within Google’s own team will affect that launch.</p></div><p></p> TechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-4825330751719825242018-08-14T08:21:00.001-07:002018-08-14T08:21:06.590-07:00Mira Rajput tells that her daughter Misha says Hi Baby everyday to her baby bump<div class="panel panel-primary marginb20 visible-xs" readability="7"><h3 class="panel-title"><span class="bold">Get Daily Updates In Email</span></h3></div><div class="blog-box-img thumbnail"><img alt="Mira Rajput tells that her daughter Misha says Hi Baby everyday to her baby bump" src="http://i0.wp.com/laughingcolours.com/wp-content/uploads/2018/08/39105929_1835109036577393_5092661925389533184_n.jpg?w=618" data-recalc-dims="1" /></div><p>Shahid Kapoor and Mira Rajput are expecting their&nbsp;second child and these days Mira is also quite active on the social media. Recently, all happy and excited mommy Mira opened up about how her&nbsp;2 years old daughter Misha is responding to her pregnancy to a leading magazine.</p><p>Mother of a daughter Mira revealed, “Being able to bring a life into this world, feel it grow inside, and being able to connect with the baby before it has actually even arrived is surreal. And this time it’s been so interesting to see how Misha has been through the entire process. She knows there is a baby inside and she says, ‘Hi Baby!’ every day to my tummy”.</p><blockquote class="instagram-media" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/p/Bj4oHRRlypz/?utm_source=ig_embed" data-instgrm-version="9" readability="-7.7753164557"></blockquote><p>Last year Shahid also said in an interview&nbsp;Mira was keen on adding to the brood at the earliest. “She wants to flip the norm, get the kids to a certain age and then be free to do what she likes,” he had said.</p><p>Mira and Shahid both revealed occasionally that they both came closer when Mira was pregnant with her first child Misha. The two had an&nbsp;arranged marriage and fell in love only during her first pregnancy. It is said that if a mother is pregnant a father too felt the same although a woman is carrying her child.</p><p>Shahid felt the same, in an event he had said, “When she was in labour, I held my breath. At one point, I got dizzy and she whacked me and said, ‘Why are you getting dizzy? I’m doing all the work here”.</p><blockquote class="instagram-media" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/p/BibgA8Ol-sh/?utm_source=ig_embed" data-instgrm-version="9" readability="-12.71"></blockquote><p>Talking about the actor’s professional front, he will be seen next seen in Shree Narayan Singh’s Batti Gul Meter Chalu. The film also stars Shraddha Kapoor, Divyendu Sharma and Yami Gautam, revolves around the issue of power shortage and huge electricity bills. It is slated to release on 21&nbsp;September.</p><blockquote class="instagram-media" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/p/BmQ6x6Yl7j4/?utm_source=ig_embed" data-instgrm-version="9" readability="-3.28309859155"></blockquote><p>Shahid was last seen in Bhansali’s Padmavat which was a blockbuster at the box office and the actor played his role efficiently and effortlessly alongside Deepika Padukone and Ranveer Singh.</p><h6 class="margint10 marginb10">Published by Soniya Kaur on 14 Aug 2018</h6> NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-67390561280247356702018-08-14T08:16:00.001-07:002018-08-14T08:16:52.363-07:00‘Dark Souls: Remastered’ arrives on Nintendo Switch October 19th<div><img src="https://o.aolcdn.com/images/dims?thumbnail=1200%2C630&amp;quality=80&amp;image_uri=https%3A%2F%2Fs.aolcdn.com%2Fhss%2Fstorage%2Fmidas%2Fcefee46d7fcecee55078f5481720f9ff%2F206593304%2FDkkL-sHX0AICUrN.jpg&amp;client=cbc79c14efcebee57402&amp;signature=f05ab9b409e51a2bd54ed6268c2944079e0a23b9" class="ff-og-image-inserted" /></div><blockquote class="twitter-tweet"><p dir="ltr" lang="en" xml:lang="en">Praise The Sun! DARK SOULS: Remastered for <a href="https://twitter.com/hashtag/NintendoSwitch?src=hash&amp;ref_src=twsrc%5Etfw">#NintendoSwitch</a> and the Solaire of Astora amiibo will launch on Oct. 19th! Journey to Lordran and experience the groundbreaking action-RPG on the go!</p><p>An online Network Test will be scheduled prior to release. Stay tuned for more info. <a href="https://t.co/WE1xNmLi0j">pic.twitter.com/WE1xNmLi0j</a></p><p>— Bandai Namco US (@BandaiNamcoUS) <a href="https://twitter.com/BandaiNamcoUS/status/1029367163562405888?ref_src=twsrc%5Etfw">August 14, 2018</a></p></blockquote><p>It’s not exactly the <a href="https://www.engadget.com/2018/04/17/dark-souls-switch-delayed-until-summer/">“Summer 2018” that was promised</a>. Presumably, it took longer than expected to adapt the intensely difficult game to the Switch’s controls. The PS4, PC and Xbox remastered version all launched as scheduled on May 25th.</p><p>The Switch version of the game will have 1080p resolution when docked in TV mode and 720p when playing the handheld version. The frame rate is 30fps, and it will support 1–6 players in online mode. DLC will be included in the remaster.</p> TechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-24596778869025964092018-08-14T05:41:00.001-07:002018-08-14T05:41:22.140-07:00More Ridiculous Things You Could Buy with Apple’s Trillion Dollar ValueTechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-827152242620217552018-08-14T03:16:00.003-07:002018-08-14T03:16:27.881-07:00Vivo Y81 launched in India with 6.22-inch notched display and MediaTek Helio P22 SoC<div><img src="https://www.xda-developers.com/files/2018/08/Vivo-Y81-Image.jpg" class="ff-og-image-inserted"/></div><br/><div><br/><p class="dropcap">The budget and lower mid-range price segments in India are quite competitive right now. With phones such as the <a href="https://forum.xda-developers.com/redmi-note-5">Xiaomi Redmi Note 5</a> Pro, Asus ZenFone Max Pro M1, and the Realme 1, it&#8217;s difficult for other companies to undercut the established competitors in this market. With the launch of the Vivo Y81 in India, Vivo is aiming to do that, but a preliminary look at the specifications leaves us skeptical as to whether it will be able to taken on phones that have better specifications.</p><br/><p>The Vivo Y81 was initially launched in June in a few markets, and Vivo has now launched it in India. Its noticeable features include the 12nm MediaTek <a href="https://www.xda-developers.com/mediatek-helio-p22-unveiled-ai-frameworks/">Helio P22</a> SoC, which also powers the <a href="https://www.xda-developers.com/xiaomi-redmi-6-6a-official-12nm-chipset/">Xiaomi Redmi 6</a>. It&#8217;s also the first buget Vivo phone to feature a tall 6.22-inch HD+ display with a notch. Its specifications are noted in the table below.</p><br/><table class="table_green"><thead><tr><th>Specifications</th><br/><th>Vivo Y81</th><br/></tr></thead><tbody><tr><td>Dimensions and weight</td><br/><td>155.06 x 75.0 x 7.77 mm, 146.5g</td><br/></tr><tr><td>Software</td><br/><td><a href="https://www.xda-developers.com/tag/android-oreo/">Android 8.1</a> Oreo with FunTouch OS 4.0</td><br/></tr><tr><td>CPU</td><br/><td>Octa-core MediaTek Helio P22 (8x 2.0GHz Arm Cortex-A53 cores); PowerVR GE8320 GPU</td><br/></tr><tr><td>RAM and storage</td><br/><td>3GB of RAM with 32GB of storage; microSD card slot</td><br/></tr><tr><td>Battery</td><br/><td>3,260mAh</td><br/></tr><tr><td>Display</td><br/><td>6.22-inch HD+ (1520&#215;720) IPS LCD with 19:9 aspect ratio, Gorilla Glass</td><br/></tr><tr><td>Connectivity</td><br/><td>Wi-Fi 802.11b/g/n (2.4GHz single band), Bluetooth 5.0</td><br/></tr><tr><td>Ports</td><br/><td>microUSB port, Dual Nano SIM slots, 3.5mm headphone jack</td><br/></tr><tr><td>Rear camera</td><br/><td>13MP with f/2.2 aperture</td><br/></tr><tr><td>Front-facing camera</td><br/><td>5MP with f/2.2 aperture, selfie flash</td><br/></tr></tbody></table><p>The MediaTek Helio P22 SoC is manufactured on a 12nm process, giving it an efficiency advantage over the Qualcomm Snapdragon 625. In terms of performance, however, it doesn&#8217;t match even the older Snapdragon 630, to say nothing of newer SoCs such as the Snapdragon 636. MediaTek&#8217;s own higher-end Helio P60 is used by the Realme 1 at a lower price point (&#8377;8,990), so the value proposition in terms of performance is missing in the Vivo Y81.</p><br/><p>In terms of software, the Vivo Y81 runs Android 8.1 Oreo with FunTouch OS 4.0 on top. It has support for face detection.</p><br/><h3>Pricing and availability</h3><br/><p>The Vivo Y81 is already on sale on the Vivo online store, Amazon India, and Flipkart. It costs &#8377;12,999 ($186) in India, competing with phones such as the Asus ZenFone Max Pro M1, Indian Xiaomi Redmi Note 5, Xiaomi Redmi Y2, Honor 9N, and the Realme 1. Consumers can buy it now with delivery time stated as early as the next day, and the phone comes in Black and Gold colors. Exchange offers are available as well on Amazon and Flipkart.</p><br/><p>In our view, the inclusion of the 12nm Helio P22 makes this an interesting phone in terms of power efficiency, but sadly, the Y81 is overpriced just like all other Vivo budget phones. Vivo as a brand typically sells well in offline channels, where phones such as the ZenFone Max Pro M1 and the Realme 1 are not available. In terms of specifications, Vivo is still holding back. If it could have been priced at around &#8377;10,000, the phone would have had a better value proposition.</p><br/><hr/><a href="http://www.vivo.com/in/products/y81" class="btn btn_" target="_self">Source: Vivo</a><br/> </div><br/><p>Want more posts like this delivered to your inbox? Enter your email to be subscribed to our newsletter.</p>SocialDr.http://www.blogger.com/profile/10319745996298175752noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-47767241593741416272018-08-14T03:16:00.001-07:002018-08-14T03:16:20.335-07:00Omnibus - Open Source Information Gathering Tool For Intelligence Collection Research And Artifact Management<div><br/><ins class="adsbygoogle"></ins><br/></div><br/><div id="aim21664493342863084123"><br/><div dir="ltr"><br/><div><br/><div class="separator"><br/><a href="https://1.bp.blogspot.com/-n_r_NofB0IU/Wx_WMSUeAoI/AAAAAAAAFXE/ZWnK_AdQPIYf5jKoIbJ4gmTraWqU6I0EwCLcBGAs/s1600/Omnibus.png"><img alt="Omnibus - Open Source Intelligence Collection Research And Artifact Management" height="546" src="https://1.bp.blogspot.com/-n_r_NofB0IU/Wx_WMSUeAoI/AAAAAAAAFXE/ZWnK_AdQPIYf5jKoIbJ4gmTraWqU6I0EwCLcBGAs/s640/Omnibus.png" title="Omnibus - Open Source Intelligence Collection Research And Artifact Management" width="640"/></a></div><br/><h2><br/><span><br/></span></h2><br/><h2><br/><span>Omnibus &#8211; Open Source Information Gathering Tool For Intelligence Collection, Research And Artifact Management</span></h2><br/><p><span><br/></span><br/><span>An Omnibus is defined as a volume containing several novels or other items previously published separately and that is exactly what the InQuest Omnibus project intends to be for Open Source Intelligence collection, research, and artifact management.</span><br/><span><br/></span><br/><span>By providing an easy to use interactive command line application, users are able to create sessions to investigate various artifacts such as IP addresses, domain names, email addresses, usernames, file hashes, Bitcoin addresses, and more as we continue to expand.</span><br/><span><br/></span><br/><span>This project has taken motivation from the greats that came before it such as SpiderFoot, Harpoon, and DataSploit. Much thanks to those great authors for contributing to the world of open source.</span><br/><span><br/></span><br/><span>The application is written with Python 2.7 in mind and has been successfully tested on OSX and Ubuntu 16.04 environments.</span><br/><span><br/></span><br/><span>As this is a pre-release of the final application, there will very likely be some bugs and uncaught exceptions or other weirdness during usage. Though for the most part, it is fully functional and can be used to begin OSINT investigations right away.</span><br/><span><br/></span><br/></p><br/><h3><br/><span>Contribution</span></h3><br/><p><span>Omnibus is built in a modular manner that allows the easy addition, or removal, of OSINT plugins. Each module is included in a single directory, and by adding a few lines of code, your module could be the next one!</span><br/><span><br/></span><br/><span>As this README and the Wiki continues to grow, we will have full-fledged examples of how to write custom plugins and get them in as Pull Requests!</span><br/><span><br/></span><br/></p><br/><h3><br/><span>Vocabulary</span></h3><br/><p><span>Before we begin we&#8217;ll need to cover some terminology used by Omnibus.</span></p><br/><ol><li>An item to investigate</li><br/><li>Artificats can be created in two ways:</li><br/></ol><p><span>Using the new command or by being discoverd through module execution</span></p><br/><ol><li>Cache of artifacts created after starting the Omnibus CLI</li><br/><li>Each artifact in a session is given an ID to quickly identify and retrieve the artifact from the cache</li><br/><li>Commands can be executed against an artifact either by providing it&#8217;s name or it&#8217;s corresponding session ID</li><br/></ol><ol><li>Python script that performs some arbitirary OSINT task against an artifact</li><br/></ol><h3><br/><span>Running Omnibus</span></h3><br/><p><span>Starting up Omnibus for investigation is a simple as cloning this GitHub repository, installing the Python requirements using </span><span>pip install -r requirements.txt </span><span>and running </span><span>python2.7 omnibus-cli.py</span><span>.</span><br/><span><br/></span></p><br/><h3><br/><span>API Keys</span></h3><br/><p><span>You must set any API keys you&#8217;d like to use within modules inside the </span><span>omnibus/etc/apikeys.json</span><span> file. This file is a JSON ocument with placeholders for all the services which require API keys, and is only accessed by Omnibus on a per module basis to retrieve the exact API key a module needs to execute.</span><br/><span><br/></span><br/><span>It should be noted that most of the services requiring API keys have free accounts and API keys. Some free accounts may have lower resource limits, but that hasn&#8217;t been a problem during smaller daily investigations or testing the application.</span><br/><span><br/></span><br/><b>A handy tip: </b><span>Use the </span><span>cat apikeys</span><span> command to view which keys you do in fact have stored. If modules are failing, check here first to ensure your API key is properly saved.</span></p><br/><h3><br/><span>Interactive Console</span></h3><br/><p><span>When you first run the CLI, you&#8217;ll be greeted by a help menu with some basic information. We tried to build the command line script to mimic some common Linux console commands for ease of use. Omnibus provides commands such as </span><span>cat</span><span> to show information about an artifact, </span><span>rm</span><span> to remove an artifact from the database, </span><span>ls</span><span> to view currently session artifacts, and so on.</span><br/><span><br/></span><br/><span>One additional feature of note is the use of the &#62; character for output redirection. For example, if you wish to retrieve the details of an artifact named &#8220;inquest.net&#8221; saved to a JSON file on your local disk you&#8217;d simply run the command: </span><span>cat inquest.net &#62; inquest-report.json</span><span> and there it would be! This feature also works with full file paths instead of relative paths.</span></p><br/><h4><br/><span>The high level commands you really need to know to use Omnibus are:</span></h4><br/><p><span>start a new session</span></p><br/><ul><li><b>new &#60;artifact name&#62;</b></li><br/></ul><p><span>create a new artifact for investigation</span><br/><span>display list of available modules</span></p><br/><ul><li><b>open &#60;file path&#62;</b></li><br/></ul><p><span>load a text file list of artifacts into Omnibus as artifacts</span></p><br/><ul><li><b>cat &#60;artifact name | session id&#62;</b></li><br/></ul><p><span>view beautified JSON database records</span><br/><span>show all active artifacts</span><br/><span>remove an artifact from the database</span><br/><span>clear the current artifact session</span><br/><span><br/></span><br/><span>Also, if you ever need a quick reference on the different commands available for different areas of the application there are sub-help menus for this exact purpose. Using these commands will show you only those commands available relevant to a specific area:</span><br/><span>overall commands such as help, history, quit, set, clear, banner, etc.</span><br/><span>display commands specific to artifacts and their management</span><br/><span>display helpful commands around managing sessions</span><br/><span>show a list of all available modules</span><br/><span><br/></span></p><br/><h3><br/><span>Artifacts</span></h3><br/><p><span>Most cyber investigations begin with one or more technical indicators, such as an IP address, file hash or email address. After searching and analyzing, relationships begin to form and you can pivot through connected data points. These data points are called Artifacts within Omnibus and represent any item you wish to investigate.</span><br/><span><b><br/></b></span><br/><span><b>Artifacts can be one of the following types:</b></span></p><br/><ul><li>IPv4 address</li><br/><li>FQDN</li><br/><li>Email Address</li><br/><li>Bitcoin Address</li><br/><li>File Hash (MD5, SHA1, SHA256, SHA512)</li><br/><li>User Name</li><br/></ul><h4><br/><span>Creating &#38; Managing Artifacts</span></h4><br/><p><span>The command &#8220;new&#8221; followed by an artifact will create that artifact within your Omnibus session and store a record of the artifact within MongoDB. This record holds the artifact name, type, subtype, module results, source, notes, tags, children information (as needed) and time of creation. Every time you run a module against a created or stored artifact, the database document will be updated to reflect the newly discovered information.</span><br/><span><br/></span><br/><span>To create a new artifact and add it to MongoDB for tracking, run the command <span>new </span></span><span>&#60;artifact name&#62;</span><span>. For example, to start investigation the domain anydomain.com, you would run </span><span>new anydomain.com</span><span>.</span><br/><span><br/></span><br/><span>Omnibus will automatically determine what type the artifact is and ensure that only modules for that type are executed against the artifact.</span><br/><span><br/></span><br/><span>When a module is created, new artifacts may be found during the discovery process. For example, running the &#8220;dnsresolve&#8221; command might find new IPv4 addresses not previously seen by Omnibus. If this is the case, those newly found artifacts are automatically created as new artifacts in Omnibus and linked to their parent with an additional field called &#8220;source&#8221; to identify from which module they were originally found.</span><br/><span><br/></span><br/><span>Artifacts can be removed from the database using the &#8220;delete&#8221; command. If you no longer need an artifact, simply run the delete command and specify the artifacts name or the session ID if it has one.</span><br/><span><br/></span></p><br/><h2><br/><span>Sessions</span></h2><br/><p><span>Omnibus makes use of a feature called &#8220;sessions&#8221;. Sessions are temporary caches created via Redis each time you start a CLI session. Every time you create an artifact, that artifacts name is added to the Session along with a numeric key that makes for easy retrieval, searching, and action against the related artifact. For example if you&#8217;re session held one item of &#8220;inquest.net&#8221;, instead of needing to execute </span><span>virustotal inquest.net</span><span> you could also </span><span>run virustotal 1</span><span> and you would receive the same results. In fact, this works against any module or command that uses an artiface name as it&#8217;s first argument.</span><br/><span><br/></span><br/><span>Sessions are here for easy access to artifacts and will be cleared each time you quit the command line session. If you wish to clear the session early, run the command &#8220;wipe&#8221; and you&#8217;ll get a clean slate.</span><br/><span><br/></span><br/><span>Eventually, we would like to add a Cases portion to Omnibus that allows users to create cases of artifacts, move between them, and maintain a more coherent OSINT management platform. Though for this current pre-release, we will be sticking with the Session. &#128578;</span></p><br/><h3><br/><span>Modules</span></h3><br/><p><span>Omnibus currently supports the following list of modules. If you have suggestions or modules or would like to write one of your own, please create a pull request.</span><br/><span><br/></span><br/><span>Also, within the Omnibus console, typing the module name will show you the Help information associated with that module.</span><br/><span><b><br/></b></span><br/><span><b>Modules</b></span></p><br/><ul><li>Blockchain.info</li><br/><li>Censys</li><br/><li>ClearBit</li><br/><li>Cymon</li><br/><li>DNS subdomain enumeration</li><br/><li>DNS resolution</li><br/><li>DShield (SANS ISC)</li><br/><li>GeoIP lookup</li><br/><li>Full Contact</li><br/><li>Gist Scraping</li><br/><li>GitHub user search</li><br/><li>HackedEmails.com email search</li><br/><li>Hurricane Electric host search</li><br/><li>HIBP search</li><br/><li>Hunter.io</li><br/><li>IPInfo</li><br/><li>IPVoid</li><br/><li>KeyBase</li><br/><li>Nmap</li><br/><li>PassiveTotal</li><br/><li>Pastebin</li><br/><li>PGP Email and Name lookup</li><br/><li>RSS Feed Reader</li><br/><li>Shodan</li><br/><li>Security News Reader</li><br/><li>ThreatCrowd</li><br/><li>ThreatExpert</li><br/><li>TotalHash</li><br/><li>Twitter</li><br/><li>URLVoid</li><br/><li>VirusTotal</li><br/><li>Web Recon</li><br/><li>WHOIS</li><br/></ul><p><span>As these modules are a work in progress, some may not yet work as expected but this will change over the coming weeks as we hope to officially release version 1.0 to the world!</span></p><br/><h3><br/><span>Machines</span></h3><br/><p><span>Machines are a simple way to run all available modules for an artifact type against a given artifact. This is a fast way if you want to gather as much information on a target as possible using a single command.</span><br/><span><br/></span><br/><span>To perform this, simply run the command</span><span> <span>machine &#60;artifact name|session ID&#62;</span><span>&#160;</span></span><span> and wait a few minutes until the modules are finished executing.</span><br/><span><br/></span><br/><span>The only caveat is that this may return a large volume of data and child artifacts depending on the artifact type and the results per module. To remedy this, we are investigating a way to remove specific artifact fields from the stored database document to make it easier for users to prune unwanted data.</span></p><br/><h3><br/><span>Quick Reference Guide</span></h3><br/><p><span><b>Some quick commands to remember are:</b></span></p><br/><ul><li><span>session</span><span> &#8211; start a new artifact cache</span></li><br/><li><span>cat &#60;artifact name&#62;|apikeys</span><span> &#8211; pretty-print an artifacts document or view your stored API keys</span></li><br/><li><span>open &#60;file path&#62;</span><span> &#8211; load a text file list of artifacts into Omnibus for investigation</span></li><br/><li><span>new &#60;artifact name&#62;</span><span> &#8211; create a new artifact and add it to MongoDB and your session</span></li><br/><li><span>find &#60;artifact name&#62;</span><span> &#8211; check if an artifact exists in the db and show the results</span></li><br/></ul><h3><br/><span>Reporting</span></h3><br/><p><span>Reports are the JSON output of an artifacts database document, essentially a text file version of the output of the &#8220;cat&#8221; command. But by using the </span><span>report</span><span> command you may specify an artifact and a filepath you wish to save the output to:</span><br/><span><br/></span><br/><span>omnibus &#62;&#62; report inquest.net /home/adam/intel/osint/reports/inq_report.json</span><br/><span><br/></span><br/><span>This above command overrides the standard report directory of omnibus/reports. By default, and if you do not specify a report path, all reports will be saved to that location. Also, if you do not specify a file name the report will use the following format:</span><br/><span><br/></span><br/><span>[artifact_name]_[timestamp].json</span></p><br/><h3><br/><span>Redirection</span></h3><br/><p><span>The output of commands can also be saved to arbitrary text files using the standard Linux character &#62;. For example, if you wish to store the output of a VirusTotal lookup for a host to a file called &#8220;vt-lookup.json&#8221; you would simply execute:</span><br/><span><br/></span><br/><span>virustotal inquest.net &#62; vt-lookup.json</span><br/><span><br/></span><br/><span>By default the redirected output files are saved in the current working directory, therefore &#8220;omnibus/&#8221;, but if you specify a full path such as </span><span>virustotal inquest.net &#62; /home/adam/intel/cases/001/vt-lookup.json</span><span> the JSON formatted output will be saved there.</span></p><br/><h3><br/><span>Monitoring Modules</span></h3><br/><p><span>Omnibus will soon be offering the ability to monitor specific keywords and regex patterns across different sources. Once a match is found, an email or text message alert could be sent to the user to inform them on the discovery. This could be leveraged for real-time threat tracking, identifying when threat actors appear on new forums or make a fresh Pastebin post, or simply to stay on top of the current news.</span></p><br/><h4><br/><span>Coming monitors include:</span></h4><br/><ul><li>RSS monitor</li><br/><li>Pastebin monitor</li><br/><li>Generic Pastesite monitoring</li><br/><li>Generic HTTP/JSON monitoring</li><br/></ul><p><span><a href="https://github.com/InQuest/omnibus/archive/master.zip" rel="nofollow" target="_blank">Download OSINT Omnibus</a></span></p></div><br/></div><br/></div>SocialDr.http://www.blogger.com/profile/10319745996298175752noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-39134827967415784722018-08-14T02:41:00.001-07:002018-08-14T02:41:07.822-07:00US bans government personnel from using Huawei and ZTE devices<div><img src="https://o.aolcdn.com/images/dims?thumbnail=1200%2C630&amp;quality=80&amp;image_uri=https%3A%2F%2Fo.aolcdn.com%2Fimages%2Fdims%3Fcrop%3D1600%252C1066%252C0%252C0%26quality%3D85%26format%3Djpg%26resize%3D1600%252C1066%26image_uri%3Dhttp%253A%252F%252Fo.aolcdn.com%252Fhss%252Fstorage%252Fmidas%252Fdec19ad7d6c16a78f46d9fb5ff9ce539%252F205763840%252F_MG_4046.jpg%26client%3Da1acac3e1b3290917d92%26signature%3D1617b584589a4791cddcac4819d82f6926666bf4&amp;client=cbc79c14efcebee57402&amp;signature=3a20d932cc0ec8cdc438e74adb39c445507d47b2" class="ff-og-image-inserted" /></div><p>While the two companies might lose clients due to the new law, it could have been much worse for ZTE. The Senate already <a href="https://www.engadget.com/2018/06/19/senate-votes-to-reinstate-zte-ban/">voted</a> to reinstate a ban that would continue preventing ZTE from working with American manufacturers. It could have been a death sentence for the tech giant, seeing as it relies on US chipmakers for parts. However, the House of Representatives passed a version of the Defense Authorization Act without the language that reinstates those sanctions. The two chambers worked on a compromise after the Senate <a href="https://www.engadget.com/2018/07/20/senate-gives-up-zte-sanctions/">gave up</a> on trying to restore the ban, and this measure is what they came up with.</p><p>The US government considers Huawei and ZTE as <a href="https://www.engadget.com/2012/10/09/huawei-zte-respond-to-congress/">security threats</a> and has been seeing them as such for a long time. Back in 2012, the Congress <a href="https://www.engadget.com/2012/10/08/huawei-and-zte-congress-report-draft/">published</a> the results of an 11-month probe wherein the investigators noted how the companies failed to explain their ties to the Chinese government. Earlier this year, the Pentagon <a href="https://www.engadget.com/2018/05/02/pentagon-bans-huawei-zte-phones-military-retailers/">banned</a> the companies’ phones from military base retailers, citing security concerns. And just recently, the Democratic National Committee <a href="https://www.engadget.com/2018/08/04/dnc-zte-huawei-warning/">advised</a> candidates running in November not to allow their staff to use devices by either company, especially after <a href="https://www.engadget.com/2018/04/20/dnc-sues-russia-wikileaks-trump-campaign/">what happened</a> during the 2016 Presidential Elections.</p> TechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-14300949014091836692018-08-14T02:06:00.001-07:002018-08-14T02:06:28.813-07:00Carbyne raises $15M for its next-gen 911 service, as Founders Fund invests in its first Israeli startup<p>911 and other emergency numbers have been a key route for people to contact medical, police or fire services, with some&nbsp;<a href="https://www.nena.org/page/911Statistics?">240 million calls</a> are made for urgent help in the US alone each year. But while calling the numbers is a breeze, sometimes passing on crucial information is far from that, with most of these services built and operating on legacy infrastructure that makes pinpointing accurate locations and getting more detail about the problem (including to determine whether the call might have been in error) is a challenge.</p><p>Now a company that has developed a system to improve emergency response is announcing a round of funding in the race to update those platforms.</p><p><a href="http://carbyne911.com">Carbyne</a>, a startup out of Israel that has developed a new emergency callout platform that helps providers pinpoint a callers’ exact location and enable other services to improve and speed up communication and response times — by some 65 percent on average — has raised $15 million in Series B funding.</p><p>The round is significant not just because of the boost that it will give to Carbyne itself, but because of who is doing the backing. Led by Elsted Capital Partners, it also includes Founders Fund, the VC that has <a href="https://foundersfund.com/portfolio/">backed</a> the likes of Facebook and Airbnb, but also startups that have made strong inroads into working with government and other public sector organizations on data-based services, such as Palantir, Anduril and Deep Mind (now a part of Google).</p><p>Previous backers of Carbyne have included the former prime minister of Israel, Ehud Barak, who is also the company’s chairman, and the company has now raised about $24 million, with a valuation that I understand to be in the region of $100 million, although the company is not commenting on the number.</p><p>Most of the emergency calling services that are in place around the world were built to be used with legacy wired phone networks. In many countries, however, not only are people doing away with their fixed lines, but they are making these calls from mobile phones — in some cases up to 80 percent of all emergency calls are coming from mobile phones. This means that not only are some inbound calls to public safety answering points (PSAPs) unable to provide the data that the legacy systems need, but — coming from smartphones — they potentially could provide a far richer set of data, if the systems were set up to receive it.</p><p>On top of this, it can simply take too long, or be impossible, for a reporter of an emergency to convey crucial information through a phone conversation. (Indeed, the idea for the service was hatched after founder <a href="https://techcrunch.com/video/carbyne-wants-to-replace-outdated-911-systems/">Amir Elichai discovered</a> how long it took to identify his location and other details to emergency services after he was mugged.)</p><p>Carbyne — originally called Reporty and rebranded earlier this year to the word for what is now considered to be the world’s strongest substance — lets emergency response providers connect with reporters through two products to fill that gap.</p><p>There is an app, called C-Now, that people can download on iOS or Android to provide instant video, down-to-one-meter location data, and lots of other details when making a report to emergency response call centre. (This potentially can include whatever an emergency response organization might want to collect, within the scope of a phone and the data that it can pick up either directly or via APIs from other devices, such as heart rate monitors.) The app is live in 161 countries.</p><p>There is also a service, C-Lite, that plugs directly into legacy 911 services, which lets PSAPs send links to reporters to collect additional information without the reporter needing to download an app, and without the PSAP needing to upgrade its legacy systems. Both C-Lite and the app are cloud-based to create more redundancy in case of service outages. The company also says that it is GDPR compliant and uses “military-grade” security protocols to protect people’s information when they call.</p><p>Between all of that, the company has also developed technology to pinpoint locations in indoor spaces, and also a platform that monitors all calls and other data (such as video coming from a surveillance camera) at a specific location in order to build a more comprehensive picture of the emergency.</p><p>Carbyne is not the only startup that is looking to fill the gap between legacy 911 offerings and the promises of what the next generation of cloud-based communication and mobile technology can bring to improve efficiency in these services. <a href="https://www.rapidsos.com/">RapidSOS</a>&nbsp;provides a bridge between mobile phone calls to 911 and legacy 911 PSAP services, so that those making calls on mobile can still provide location data. RapidSOS also serves as a supplement that works just on mobile in the event that the legacy system falls over, and it really came into its own during the <a href="https://techcrunch.com/2017/09/27/responding-to-a-month-long-string-of-disasters-rapidsos-makes-its-rescue-and-recovery-app-free/">trio of tropical disasters last autumn</a> across Puerto Rico, Texas and Florida.</p><p>Like Carbyne, RapidSOS has some big-name supporters: it is backed by former FCC chairmen Tom Wheeler and Julius Genachowski, in addition to a range of other investors. It’s also now integrated with services like <a href="https://techcrunch.com/2018/05/29/uber-adds-911-assistance-to-rider-app/">Uber</a> and <a href="https://techcrunch.com/2018/06/18/ios-12-will-automatically-share-your-iphones-location-with-911-centers/">Apple’s iOS</a>&nbsp;for faster reporting of location.</p><p>One of the points of differentiation between RapidSOS and Carbyne is that the latter is potentially a full replacement for the 911 system in the event that an organization was considering that route. Elichai said that there are several organizations evaluating Carbyne now in across Europe, and it is already rolling out its service in Fayette County in Georgia.</p><p>But by and large there aren’t many startups looking to disrupt this area, which was one reason why Founders Fund was interesting in backing the company. “I’m looking for businesses that aren’t massively competitive, and Carbyne stands alone in a really unpopular industry,” Trae Stephens, a partner at the firm who is leading the investment, told TechCrunch. “In the world of emergency services, it’s&nbsp;<span>really important for tech to contribute to fixing some of the antiquated systems, and that is what excited me.&nbsp;</span>I definitely looked at other companies in emergency services, but but nothing came remotely close to the approach that Carbyne has taken, which is platform-agnostic.”</p><p>Longer term, Elichai said that while emergency services will remain a primary interest, there are potential other areas where its technology could be applied.</p><p>“We see ourselves connecting any device to the platform,” he said in an interview. “Because of the fact that we have a strong real-time communications platform, we have received request from other industries.” These have included, for example, insurance companies.</p><p>“If you ski in Aspen or Chamonix, you get extreme sports insurance. If you have to make a claim, most people ski with their cell . phones now, and&nbsp;if you use Carbyne you would be able to open the claim automatically with evidence from the scene, making checking and processing much more efficient.”</p> NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-45016024803114249512018-08-14T01:55:00.003-07:002018-08-14T01:55:53.950-07:00Reports of Election Site Hacking Rankle Florida Officials<div><img src="https://gdb.voanews.com/0CE82C09-E8BA-4834-91AD-13E5117C0392_w1200_r1_s.jpg" class="ff-og-image-inserted"/></div><br/><div class="wsw"><br/><span class="dateline">TALLAHASSEE, FLORIDA &#8212;&#160;</span><br/><p>Child&#8217;s play or a signs of a serious security problem in one of the nation&#8217;s swing states?</p><br/><p>That&#8217;s the question confronting Florida election officials who are pushing back against reports that an 11-year-old hacked a replica of the state&#8217;s election website.</p><br/><p>Multiple media outlets over the weekend reported that children at a hacking conference in Las Vegas were able to easily hack into a version of the website that reports election results to the public. An 11-year-old boy got into Florida&#8217;s site within 10 minutes, while an 11-year-old girl did it in 15 minutes, according to the organizers of the event called DEFCON Voting Machine Hacking Village.</p><br/><p>State officials contend there&#8217;s no way that the replica used by hackers is an actual representation of the state&#8217;s website. </p><br/><p>&#8220;This was a mock site with likely very few, if any, security measures in place,&#8221; said Sarah Revell, a spokeswoman for Secretary of State Ken Detzner. &#8220;It is not a real-life scenario and it offers a wholly inaccurate representation of the security of Florida&#8217;s elections websites, online databases and voting systems that does not take into account the state-of-the-art security measures the Florida Department of State has in place to prevent any possible hacking attempts from being successful.&#8221;</p><br/><p>Florida&#8217;s election website that displays results is not connected to the actual local election systems responsible for tabulating votes. Instead, on election night supervisors upload unofficial results to state officials through a completely different network.</p><br/><p>Still if someone was able to manipulate the website it could create confusion and sow doubts about the actual results once they were announced. Investigators in May found evidence of a cyberattack on a Tennessee county&#8217;s elections website from a computer in Ukraine, which likely caused the site to crash just as it was reporting vote totals during a primary.</p><br/><p>Nico Sell, one of the organizers of the event, told PBS Newshour on Sunday that the replicas used at the conference were accurate representations.</p><br/><p>&#8220;The site may be a replica but the vulnerabilities that these kids were exploiting were not replicas, they&#8217;re the real thing,&#8221; the television network quoted her. &#8220;I think the general public does not understand how large a threat this is, and how serious a situation that we&#8217;re in right now with our democracy.&#8221;</p><br/><p>Mark Earley, the elections supervisor in Leon County who is a cybersecurity liaison between state and local officials, questioned how outsiders could obtain the security protocols used by Florida if they weren&#8217;t already behind the system&#8217;s firewalls. He said that all this &#8220;hacking noise&#8221; and &#8220;misinformation plays into the hands of the folks who are trying to undermine democracy.&#8221;</p><br/><p>Jeff Kosseff, a lawyer and assistant professor at the United States Naval Academy Cyber Studies Department, said states are struggling with election security threats. He said they should work with outsiders in order to see if there are flaws in their systems.</p><br/><p>&#8220;All states should look at this as a wake-up call,&#8221; Kosseff said. &#8220;What were the shortcomings identified and how they can fix it. I don&#8217;t think it should be an adversarial.&#8221;</p><br/><p>The reports of hacking into Florida&#8217;s website that reports election results coincide with a dust-up between U.S. Sen. Bill Nelson and Gov. Rick Scott over possible Russian meddling in other parts of the state&#8217;s election system.</p><br/><p>Nelson last week said Russians were able to get inside the election systems of &#8220;certain counties&#8221; and &#8220;now have free rein to move about.&#8221; He added that &#8220;the threat is real and elections officials &#8212; at all levels &#8212; need to address the vulnerabilities.&#8221;</p><br/><p>The senator has not provided any more details, saying that additional information is classified. Scott has demanded that Nelson provide proof of his claims. Last Friday two Republicans who are on the Senate intelligence community declined to confirm or deny Nelson&#8217;s statements.</p><br/><p>Russian hackers targeted at least 21 states, including Florida, ahead of the 2016 election and breached the voter registration system in at least one, Illinois, investigators say. An indictment released last month said Russian operatives sent over 100 fake emails to elections offices and personnel in Florida as part of the hacking effort. State officials have never acknowledged how many counties were targeted by the Russians.</p><br/></div>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-39144217115241684102018-08-14T01:55:00.001-07:002018-08-14T01:55:51.330-07:00White House: Trump Aide Bolton Met Turkish Envoy to Discuss US Pastor <div class="wsw"><br/><span class="dateline">WASHINGTON &#8212;&#160;</span><br/><p>White House national security adviser John Bolton met on Monday with Turkey&#8217;s ambassador to the United States to discuss Turkey&#8217;s detention of American pastor Andrew Brunson, the White House said.</p><br/><p>&#8220;At the Turkish ambassador&#8217;s request, Ambassador John Bolton met with Ambassador Serdar Kilic of Turkey (on Monday) in the White House. They discussed Turkey&#8217;s continued detention of Pastor Andrew Brunson and the state of the U.S.-Turkey relationship,&#8221; White House spokeswoman Sarah Sanders said.</p><br/><p>&#8220;The fact that there&#8217;s ongoing discussions between the two countries regarding Brunson&#8217;s return to the U.S. is positive,&#8221; said Jay Sekulow, an attorney for U.S. President Donald Trump who is also representing Brunson&#8217;s family. &#8220;I look forward to the Brunson family returning to the U.S.&#8221;</p><br/><div class="wsw__embed"><br/><figure class="media-image js-media-expand"><div class="img-wrap"><br/><div class="thumb"><br/><img alt="Turkish Ambassador to the United States Serdar Kilic speaks to the Conference on U.S.-Turkey Relations in Washington, May 22, 2017." src="https://gdb.voanews.com/307296C7-9FC1-4E07-84DD-31979E98EF1B_w250_r1_s.jpg"/></div><br/> </div><figcaption><span class="caption">Turkish Ambassador to the United States Serdar Kilic speaks to the Conference on U.S.-Turkey Relations in Washington, May 22, 2017.</span><br/></figcaption></figure></div><br/><p>Relations between NATO allies Turkey and the United States are at a low point, hurt by Brunson&#8217;s detention, as well as diverging interests in Syria. Trump doubled tariffs on Turkish steel and aluminum imports last week, contributing to a precipitous fall in the lira.</p><br/><p>U.S. officials have given no indication that the United States has been prepared to give any ground over the Brunson issue, with Trump seemingly content to keep up economic pressure.</p><br/><p>The United States is also considering a fine against Turkey&#8217;s state-owned Halkbank for allegedly helping Iran evade U.S. sanctions. Earlier this month, the United States imposed sanctions on two top officials in Erdogan&#8217;s cabinet in an attempt to get Turkey to turn over Brunson.</p><br/><p>Last week, Trump tweeted that &#8220;our relations with Turkey are not good at this time!&#8221;</p><br/><p>White House economic adviser Kevin Hassett said the Trump administration was carefully monitoring the financial situation in Turkey after its currency fell to a record low against the U.S. dollar on Monday.</p><br/><p>&#8220;We&#8217;re monitoring it very closely. Treasury Secretary (Steven) Mnuchin is monitoring it very closely,&#8221; Hassett, the chairman of the White House Council of Economic Advisers, told MSNBC.</p><br/></div>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-34674493248846468312018-08-14T00:56:00.001-07:002018-08-14T00:56:08.085-07:00Messages You Can Forward On 15th August, Independence Day<div class="panel panel-primary marginb20 visible-xs" readability="7"><h3 class="panel-title"><span class="bold">Get Daily Updates In Email</span></h3></div><div class="blog-box-img thumbnail"><img alt="Messages You Can Forward On 15th August, Independence Day" src="http://i2.wp.com/laughingcolours.com/wp-content/uploads/2018/08/39118581_722624744750676_580920212551892992_n.jpg?w=618" data-recalc-dims="1" /></div><p>India is celebrating Independence Day 2018 and we will be celebrating the 71st year of our independence. India’s freedom movement was not easy and we faced many struggles fighting against the British and getting freedom.</p><p>Today is the day when we remember the legendary freedom fighters who fought for our Independence and in the process lost their lives. In every nook and corner of the country, we witness flag hoisting at schools, colleges, residential places, government buildings.&nbsp;On television, people see the parade and even enjoy watching it. Some people sing while some listen to patriotic songs. They dress up in tricolour.</p><p><img src="http://i0.wp.com/www.hindustantimes.com/rf/image_size_960x540/HT/p2/2018/08/13/Pictures/_1273b814-9efc-11e8-851c-9c4102be3c4e.jpg?w=618&amp;ssl=1" alt="Image result for independence day" data-recalc-dims="1" /></p><p><a href="https://www.google.co.in/search?q=independence+day&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwiV8LP4hOzcAhUYcCsKHZ8TDHQQ_AUICigB&amp;biw=1366&amp;bih=631#imgrc=KeceWa4exxpfuM:" target="_blank" rel="nofollow">image source</a></p><p>1. Let’s not take our independence for granted. Let’s do our bit to make India a better place. Legacy to live for and legacy to die for.</p><p>2. May the Indian tricolour always fly high. Warm wishes on the grand occasion of Indian Independence Day!</p><p>3. Other might have forgotten, But never can I, the flag of my country furls very high.</p><p><img src="http://i0.wp.com/images.newsx.com/wp-content/uploads/2018/08/Patriotic-songs-644x362.jpg?resize=618%2C347&amp;ssl=1" alt="Image result for independence day" data-recalc-dims="1" /></p><p><a href="https://www.google.co.in/search?q=independence+day&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwiV8LP4hOzcAhUYcCsKHZ8TDHQQ_AUICigB&amp;biw=1366&amp;bih=631#imgrc=g0olZrImMC8lJM:" target="_blank" rel="nofollow">image source</a></p><p>4. It’s a great feeling to be Indian. Let’s spread the cheer all over! I Love India. Vande Mataram!</p><p>5. Thousands laid down their lives so that our country is breathing this day. Never forget their sacrifice… Happy Independence Day.</p><p>6. Meet young India emerging with flying colours, dynamic and versatile in every manner. Let the world know, we are back with a bang!</p><p><img src="http://i0.wp.com/static.newsx.com/wp-content/uploads/2018/08/Independence-644x362.jpg?resize=618%2C347&amp;ssl=1" alt="Image result for independence day" data-recalc-dims="1" /></p><p><a href="https://www.google.co.in/search?q=independence+day&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwiV8LP4hOzcAhUYcCsKHZ8TDHQQ_AUICigB&amp;biw=1366&amp;bih=631#imgrc=3cvI_VgsXg8SFM:" target="_blank" rel="nofollow">image source</a></p><p>7. Freedom is a precious gift of our freedom fighters.</p><p>8. Ask not what your country can do for you. Ask what you can do for your country! Happy Independence Day!</p><p>9. Freedom is never dear at any price. It is the breath of life. What would a man not pay for living? – Mahatma Gandhi.</p><p><img src="http://i2.wp.com/www.independencedayquote.com/wp-content/uploads/2018/06/happy-freedom.jpg?w=618" alt="Image result for independence day" data-recalc-dims="1" /></p><p><a href="https://www.google.co.in/search?q=independence+day&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwiV8LP4hOzcAhUYcCsKHZ8TDHQQ_AUICigB&amp;biw=1366&amp;bih=631#imgrc=g3TdYSJozmezGM:" target="_blank" rel="nofollow">image source</a></p><p>10. Be the cause of unity, fight against corruption and flair the flag of our nation. Happy Independence Day 2018.</p><p>11. No nation is perfect, it needs to be made perfect. Contribute towards the perfection of your country. Happy Independence Day.</p><p>12. With freedom in the mind, faith in the words, pride in our souls. Let’s salute the nation on Independence Day!</p><p><img src="http://i1.wp.com/i.ndtvimg.com/i/2017-09/indian-tricolor-on-independence-day_650x400_71505968987.jpg?w=618&amp;ssl=1" alt="Image result for independence day" data-recalc-dims="1" /></p><p><a href="https://www.google.co.in/search?q=independence+day&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwiV8LP4hOzcAhUYcCsKHZ8TDHQQ_AUICigB&amp;biw=1366&amp;bih=631#imgrc=ZntU-mSblKHDuM:" target="_blank" rel="nofollow">image source</a></p><p>13. On this Independence Day, take a minute or two to thank for such a precious gift. Take time to cherish your life and your motherland. Not forgetting the sacrifice made by our heroes who have made this day a reality. Happy Independence Day 2018.</p><p>14. Let’s salute the martyrs for the sacrifices they made and thank them for giving us our today. Happy Independence Day 2018.</p><p>15. Independence Day is both an occasion to celebrate and to remember the struggles of those who fought to give us this gift. Happy 15th August.</p><p><img src="http://i1.wp.com/i.ndtvimg.com/i/2017-09/indian-tricolor-on-independence-day_650x400_41506070853.jpg?w=618&amp;ssl=1" alt="Image result for independence day" data-recalc-dims="1" /></p><p><a href="https://www.google.co.in/search?q=independence+day&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwiV8LP4hOzcAhUYcCsKHZ8TDHQQ_AUICigB&amp;biw=1366&amp;bih=631#imgrc=f5oPWVOHCZwr2M:" target="_blank" rel="nofollow">image source</a></p><p>16. On this special day here’s wishing our dreams of a new tomorrow come true! May your Independence Day day be filled with patriotic spirit!</p><p>17. Freedom in our mind, faith in the words, pride in our souls. Let’s salute the great men and women who made this possible. Happy Independence Day!</p><p>18. Feel the freedom! Happy Independence Day.</p><p><img src="http://i0.wp.com/www.mumbailive.com/images/news/Independence-Day-4_1502715792258.jpg?w=618&amp;ssl=1" alt="Image result for independence day" data-recalc-dims="1" /></p><p><a href="https://www.google.co.in/search?q=independence+day&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwiV8LP4hOzcAhUYcCsKHZ8TDHQQ_AUICigB&amp;biw=1366&amp;bih=631#imgrc=lD_gjaxnpsx_GM:" target="_blank" rel="nofollow">image source</a></p><p>19. We celebrate the bravery of our ancestors and their gift of freedom. Long may our flag wave! Happy Independence Day!</p><p>20. Again, it is time for us to show other nations that we are great people from a great nation. And let’s continue our struggle towards prosperity and betterment of our dear nation. Happy Independence Day.</p><p>Happy Independence Day to one and all!</p><h6 class="margint10 marginb10">Published by Minal Gupta on 14 Aug 2018</h6> NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-75545456737816913212018-08-13T22:11:00.001-07:002018-08-13T22:11:39.075-07:00How To Improve Your Cyber Security In 5 Simple Steps<p>&lt;!– CUSTOM <a href=""><img src="https://i2.wp.com/news.filehippo.com/wp-content/uploads/2018/08/security-642x500.png?resize=642%2C500&amp;ssl=1" alt="How To Improve Your Cyber Security In 5 Simple Steps" title="security" data-recalc-dims="1" /></a><br />–&gt;</p><h2>Using a quality antivirus, strong passwords, and a VPN for internet connections, with regular software updates and data backups, improves your cyber security.</h2><p>In previous instalments of this series, we discussed the basics of computer viruses and other forms of <a href="https://news.filehippo.com/2018/01/a-beginners-guide-to-malware-viruses-and-spyware-online/">malicious software</a>, and considered the basic principles and practices of <a href="https://news.filehippo.com/2018/07/what-is-cyber-security/">cyber security</a> itself. Continuing our discussion on security, in this article we’ll be looking at five simple steps you can take right now to improve your cyber security.</p><h3>1. Use a Good Quality Antivirus</h3><p>The first line of defense against computer viruses, worms, Trojans, spyware, adware, ransomware, and other forms of malware is your antivirus software suite. Using a good quality antivirus remains an essential element of an effective cyber security regime.</p><p>A good <a href="https://news.filehippo.com/2018/07/best-antivirus-software/">antivirus</a> should be able to detect and deal with malware based on file signatures. These are essentially digital fingerprints uniquely associated with specific files, which have been identified and documented as malware in a regularly updated virus database at the heart of the antivirus system. The daily updates your antivirus software will require are primarily aimed at keeping its database of malware signatures as current as possible.</p><div id="attachment_32827" class="wp-caption aligncenter"><img class="wp-image-32827 size-full" src="https://i1.wp.com/news.filehippo.com/wp-content/uploads/2018/08/security.png?resize=660%2C495&amp;ssl=1" alt="" width="660" height="495" data-recalc-dims="1" /><p class="wp-caption-text">(Image Source: <a href="https://www.flickr.com/photos/73226627@N03/36175697691/">Flickr</a>)</p></div><p>The problem with virus databases is they’re only as complete as current knowledge allows. Unknown strains of malware aren’t included, and file signatures for existing strains of malware which have mutated or been doctored by their developers won’t be included either.</p><p>To combat this, most antivirus software will also supplement its signature-based approach with what’s known as heuristic or behavioral analysis. This consists of constant monitoring of your running software and processes, to see if they exhibit any abnormal or suspicious behavior which may be caused by an infection.</p><p>Any such behavior can then be red-flagged, with the antivirus software giving you the option of terminating the suspicious process and/or putting the suspect files into quarantine where they can do no harm until they’ve been properly assessed.</p><p>We’ve previously reviewed a number of products and you can now discover our <a href="https://news.filehippo.com/2018/07/best-antivirus-software/"><strong>best antivirus for Windows</strong></a>, and the <a href="https://news.filehippo.com/2018/08/best-mac-antivirus/"><strong>best antivirus for Mac</strong></a>.</p><h3>2. Use A Virtual Private Network (VPN)</h3><p>With unscrupulous practices in targeted news and advertising making their own headlines through scandals like the <a href="https://news.filehippo.com/2018/06/alternative-messaging-platforms-post-cambridge-analytica/">Cambridge Analytica</a> affair, internet users are now looking for more ways than ever to protect their privacy online. Using a VPN is an effective way of improving this aspect of your cyber security.</p><p>A VPN uses data scrambling or encryption to create a safe channel between your system, the VPN service infrastructure, and the internet at large, one which can’t be readily deciphered by anyone looking to eavesdrop or trying to understand the information stream which is passing through it.</p><p>Besides the encryption they offer, VPN services also typically have servers and infrastructure scattered across the globe, enabling users to pick the geographical location of the internet access point that they’re virtually connecting from. This enables people in areas where internet access or content are restricted to bypass many of these limitations.</p><p>The VPN market is growing rapidly, with access to VPNs available via online services, mobile apps, desktop software, and web browser extensions. And of course, with so many VPNs to choose from, we’ve narrowed it down to our <strong><a href="https://news.filehippo.com/2018/06/top-five-vpns/">best VPN</a>s</strong> to use in 2018 to help you decide.&nbsp;</p><div id="attachment_32462" class="wp-caption aligncenter"><img class="wp-image-32462 size-full" src="https://i1.wp.com/news.filehippo.com/wp-content/uploads/2018/06/Avast-SecureLine-connected-to-USA-NY-e1529918688576.png?resize=660%2C441&amp;ssl=1" alt="Avast SecureLine VPN" width="660" height="441" data-recalc-dims="1" /><p class="wp-caption-text">Make use of a secure VPN to protect your privacy and information when using the internet</p></div><h3>3. Always Use Secure Passwords&nbsp;</h3><p>Lax <a href="https://news.filehippo.com/2018/05/how-secure-is-your-device-five-most-common-password-fails-revealed/">password practices</a> are consistently named by cyber security experts as one of the principal reasons for successful hacking attempts, data breaches, identity theft, and a host of other problems.</p><p>The use of weak or duplicate passwords makes life much easier for hackers and cyber-criminals, empowering them to hijack personal accounts, infiltrate corporate networks, steal data and funds, or distribute malware.</p><p>A strong password policy should include the following aspects:</p><ul><li>Passwords should ideally be eight or more characters long, and contain a mixture of numbers, letters, and symbols.</li><li>Hardy old chestnuts like “12345678”, “qwerty”, or the name of your dog are not advised. These are the quintessential weak passwords cyber security experts always complain about, since combinations like this are so widely used.</li><li>Default passwords and PINs issued with new hardware or freshly registered accounts should be changed as soon as possible after acquiring the equipment or starting your online activity.</li><li>Using the same password for multiple accounts is a definite no-no. This also applies to using slight variants of the same password (JoeBlogs1, JoeBlogs2, etc.)</li><li>Keep your passwords private and don’t share them with anyone. Even if you trust a person with your credentials, there’s no guarantee that the information won’t fall into the wrong hands through email phishing, or other social engineering tactics.</li><li>Even the strongest passwords won’t stay strong forever. So you should make a point of changing your passwords on a periodic basis. Most businesses insist on this for their employees, with mandatory password renewals occurring regularly.</li><li>Use a <a href="https://filehippo.com/download_lastpass_free_password_manager/">password manager</a>. If you’re like most people, you’ll have several different accounts, and multiple passwords to juggle and remember. Password managers ship as online services, web browser extensions, mobile apps, or desktop software, and do the remembering for you.</li></ul><h3>4. Regularly Update Your Drivers and Software</h3><p>Downloading and installing tweaks and new releases of desktop software and mobile apps is a great way of ensuring that your programs have the latest tools and features, improvements to their user interfaces, and include fixes to pre-existing bugs and glitches. But that’s not all that software updates can achieve.</p><p>Cyber security professionals are also widely of the opinion that regular updates to your operating system, device drivers, and application software are an essential element in improving and maintaining your cyber security. This is because older editions of these programs and utilities may contain weaknesses and errors hackers and cyber-criminals can exploit to gain access. These vulnerabilities are usually addressed in the latest versions of the software.</p><div id="attachment_32793" class="wp-caption aligncenter"><a href="https://i2.wp.com/news.filehippo.com/wp-content/uploads/2018/08/avira-software-updater-pro.png?ssl=1"><img class="size-full wp-image-32793" src="https://i2.wp.com/news.filehippo.com/wp-content/uploads/2018/08/avira-software-updater-pro.png?resize=660%2C330&amp;ssl=1" alt="avira software updater pro" width="660" height="330" data-recalc-dims="1" /></a><p class="wp-caption-text">Keep your software up to date with an automatic software updater</p></div><p>Fixes for newly discovered vulnerabilities can also be issued via security patches – small-scale updates that focus on solving a particular problem. This is the philosophy behind many operating system updates.</p><p>With a typical user having several applications installed on their system at any given time, keeping track of the update process can be a bit of a challenge. Therefore, it’s recommended that automatic update options should be enabled wherever they’re available.</p><p>To make software updating easier, there’s a class of program known as automatic software updaters, which enable you to easily find and select the software updates you need, and even to schedule when and how they should occur. <strong><a href="https://filehippo.com/download_avira-software-updater-pro/">Avira Software Updater Pro</a></strong> is a good example.</p><h3>5. Back Up and Periodically Restore Your Data</h3><p>For individual and corporate users alike, having reliable and up to date information available always is a must. Documents, photographs, media files, applications, and other information need to be in an uncorrupted and usable form.</p><p>To ensure this, it’s essential to have a back-up strategy, whereby an image of the current files on your system is captured on a regular basis and stored in a safe location where they can be restored to your hardware at a moment’s notice. This safeguards your essential data in the event of a hardware failure or network error that adversely affects your files, or a cyber security incident that leads to the corruption or compromise of your programs and documents.</p><p>Saving information to removable hardware such as tape drives or portable hard disks is one option. However, using a dedicated and hosted backup and recovery service like <a href="https://filehippo.com/download_acronis-backup-for-pc/">Acronis</a> helps ensure you’ll have continuous protection against hardware failure and other mishaps.</p><div id="attachment_32437" class="wp-caption aligncenter"><a href="https://i0.wp.com/news.filehippo.com/wp-content/uploads/2018/06/recoverit2.jpg?ssl=1"><img class="wp-image-32437 size-full" src="https://i0.wp.com/news.filehippo.com/wp-content/uploads/2018/06/recoverit2.jpg?resize=660%2C389&amp;ssl=1" alt="Recoverit - Select files" width="660" height="389" data-recalc-dims="1" /></a><p class="wp-caption-text">Make sure to back-up your data… or have a handy piece of software ready to ensure you can recover lost files</p></div><p>Redundancy (having alternative storage facilities, network connections, and communications infrastructure) is key to the backup process, and systems that implement backups with cyber security in mind will also have measures in place to ensure fast and comprehensive disaster recovery. <a href="https://filehippo.com/download_recoverit/">Recoverit Data Recovery Software</a> is a leading name in this area.</p><p>To ensure your backups are reliable, it’s also a good idea to periodically restore your files from the most recent archives that you’ve created, to test them for data integrity and usability.</p><h2>Final Thoughts</h2><p>Cyber security can be a complex and many-layered affair, but with these five simple steps you can easily boost and maintain your defensive capabilities.</p><p>As a final and additional move, be sure to pay regular visits to the <a href="https://filehippo.com/">FileHippo</a> website for news and analysis on cyber security and other issues, essential software updates, and new software releases.</p> TechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-78771991640811421602018-08-13T21:16:00.005-07:002018-08-13T21:16:53.433-07:00Wildfire Forces Evacuations in Glacier, Yosemite to Reopen<div class="wsw"><br/><p>A wildfire destroyed structures and forced evacuations Monday from the busiest area of Montana&#8217;s Glacier National Park, as officials in California prepared to reopen Yosemite National Park following a two-week closure.</p><br/><p>The National Park Service said Glacier&#8217;s 25-site Sprague Creek campground was being evacuated a day after a fast-moving fire forced the evacuation of 82 rooms at the historic Lake McDonald Lodge.</p><br/><p>A second campground, with 87 sites and some private residences, also was evacuated and a portion of the scenic Going-to-the-Sun-Road was closed to traffic.</p><br/><p>Glacier officials said in a statement that structures on the north end of Lake McDonald were lost but did not provide details on the number and type. Officials had no estimate on the fire&#8217;s size.</p><br/><p>Wildfires flare up regularly at many of the large national parks that dot the U.S. West, often burning in densely-forested, backcountry areas where their effects are limited. But this year&#8217;s blazes threaten to have a magnified impact coming at the height of the summer tourist season.</p><br/><div class="wsw__embed"><br/><figure class="media-image js-media-expand"><div class="img-wrap"><br/><div class="thumb"><br/><img alt="A man, who usually advertises a computer repair store, holds up a sign thanking firefighters working on the Carr Fire, Aug. 13, 2018, in Redding, California." src="https://gdb.voanews.com/9FAE9217-B419-41D8-8E72-BDACB40B6171_w250_r0_s.jpg"/></div><br/> </div><figcaption><span class="caption">A man, who usually advertises a computer repair store, holds up a sign thanking firefighters working on the Carr Fire, Aug. 13, 2018, in Redding, California.</span><br/></figcaption></figure></div><br/><p>Yosemite was scheduled to reopen Tuesday after being largely closed since July 25 due to smoke from fires in remote areas that choked the scenic Yosemite Valley.</p><br/><p>The closure caused upheaval for thousands of tourists whose summer trips were cancelled. Visitors were warned to expect limited hours and services as the park returns to normal.</p><br/><p>The fire burning in Glacier was one of several started by lightning on Saturday evening. Windy, dry conditions on Sunday caused the blaze to spread rapidly.</p><br/><p>It&#8217;s the second year in a row that wildfires prompted evacuations around Lake McDonald. A blaze in the area last year destroyed the Sperry Chalet, an iconic backcountry lodge built in 1914.</p><br/><p>Taylor Creasey of Whitefish said she and a friend drove up to the lodge Sunday afternoon after they heard about the fire, the Missoulian newspaper reported. She posted a video on Facebook of huge plumes of smoke hanging over burning ridges around the lake.</p><br/><p>&#8220;We didn&#8217;t expect to see anything that crazy,&#8221; Creasey said Monday. &#8220;It was so cold there, but at the same time really hot &#8212;you could feel the heat radiating across the lake. It was windy and cold and hot all at the same time.&#8221;</p><br/><p>Two planes from Canada were brought in to help battle the blaze, but officials said high winds prevented their pilots from flying close enough to the fire to be effective.</p><br/></div>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-75932446195582686342018-08-13T21:16:00.003-07:002018-08-13T21:16:50.886-07:00US Rests Case Against Former Trump Aide Manafort<div><img src="https://gdb.voanews.com/B4050312-D47E-4772-A7EA-A04861A14DB9_cx0_cy8_cw0_w1200_r1_s.jpg" class="ff-og-image-inserted"/></div><br/><div class="wsw"><br/><span class="dateline">ALEXANDRIA, VIRGINIA &#8212;&#160;</span><br/><p>U.S. prosecutors on Monday rested their case against former Trump campaign chairman Paul Manafort after 10 days of testimony detailing how he avoided taxes on at least $16 million of income and lied to banks to maintain an extravagant lifestyle once his work for pro-Kremlin politicians in Ukraine dried up.</p><br/><p>More than two dozen witnesses painted a picture of Manafort, 69, as a lavish spender with little regard for the law. A political consultant in the Ukraine, Manafort stashed his money in 31 undisclosed offshore bank accounts, and skirted taxes on that income by wiring it directly to vendors to snap up real estate, bespoke suits, cars and antique rugs, the witnesses said.</p><br/></div>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-62126848060122289792018-08-13T21:16:00.001-07:002018-08-13T21:16:48.243-07:00Tourists Find Silver Lining in Turkey's Lira Crash<div><img src="https://gdb.voanews.com/F7BE1136-2279-427B-8CB3-5A34BC034EEF_cx0_cy9_cw0_w1200_r1_s.jpg" class="ff-og-image-inserted"/></div><br/><div class="wsw"><br/><span class="dateline">ISTANBUL &#8212;&#160;</span><br/><p>Visitors to Turkey flocked to its high-end shops to snap up bargains on Monday, their purchasing power buoyed by a currency crisis as the country&#8217;s lira sank to a record low beyond 7 per dollar.</p><br/><p>Barely moving lines of mainly Arab tourists snaked outside the Chanel and Louis Vuitton stores in Nisantasi, an upscale Istanbul neighborhood, waiting to reap the benefits of a meltdown that saw the currency lose 18 percent on Friday alone.</p><br/><p>&#8220;We&#8217;re buying clothes, we&#8217;re buying makeup, we&#8217;re buying brand names,&#8221; said Fatima Ali from Kuwait, visiting the city with her two daughters. &#8220;The prices are very cheap.&#8221;</p><br/><p>Like many of her fellow shoppers, Ali brought her suitcases along to fill up. She stood outside a makeup store holding three.</p><br/><p>The lira has lost more than 40 percent against the dollar this year, amid worries about President Tayyip Erdogan&#8217;s influence over the economy, his repeated calls for lower interest rates, and worsening ties with the United States.</p><br/><p>Erdogan has also urged Turks to extend their hospitality to tourists, who were bringing dollars into the country at a critical time.</p><br/><p>&#8220;You are already very hospitable but keep that up and extend it. Because at a time when some people are taking out dollars, they are bringing it to you,&#8221; he told a crowd of supporters at the weekend.</p><br/><p>Portraying the lira weakness a plot, Erdogan has repeatedly called on Turks to sell their dollars to shore the local currency up.</p><br/><p>An employee at an upscale clothing store who declined to give his name said the amount of shoppers was unusual even in high season, attributing it to the lira&#8217;s fall.</p><br/><p>One Egyptian shopper estimated he had saved about $1,000 in comparison to buying the same gifts and clothes at home.</p><br/><p>&#8220;We hope that the currency, for Turkey&#8217;s sake, becomes better,&#8221; said another, Khalid al-Fahad from Kuwait. &#8220;And at the same time we hope for the sake of customers here that the lira remains as is.&#8221;</p><br/></div>NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-70739537120866235672018-08-13T21:06:00.001-07:002018-08-13T21:06:37.085-07:00Court blocks FCC from cutting broadband subsidies in tribal lands<div><img src="https://o.aolcdn.com/images/dims?thumbnail=1200%2C630&amp;quality=80&amp;image_uri=https%3A%2F%2Fo.aolcdn.com%2Fimages%2Fdims%3Fcrop%3D4000%252C2667%252C0%252C0%26quality%3D85%26format%3Djpg%26resize%3D1600%252C1067%26image_uri%3Dhttp%253A%252F%252Fo.aolcdn.com%252Fhss%252Fstorage%252Fmidas%252Fae0c2eced85841384cda1e9ec83204cc%252F206591690%252Fajit-pai-chairman-of-the-federal-communications-commission-center-picture-id892689564%26client%3Da1acac3e1b3290917d92%26signature%3D719dac93a2fd7c0a4ace8b1f092d17cfdbc397e2&amp;client=cbc79c14efcebee57402&amp;signature=0b44f07b8e5cf84359489bd43d6aad2d130192dd" class="ff-og-image-inserted" /></div><p>The judges behind the ruling also rejected the FCC’s claim that cutting the subsidies would spur carriers to build their own networks in tribal areas. The Commission didn’t show historical evidence that reduced subsidies would lead to more telecom investment, according to the court. If anything, the judges said, the evidence suggested the opposite. The plaintiffs pointed out that providers have typically refused to offer Lifeline service in their lands since the tribal Lifeline initiative started roughly two decades ago, and that the stricter requirements don’t give companies an incentive to expand.</p><p>The FCC unsurprisingly objected to the stay. It claimed that the plaintiffs hadn’t demonstrated the likelihood of “irreparable harm,” and insisted that blocking the Lifeline changes would amount to “wasting public funds” on areas it didn’t think should receive full subsidies.</p><p>There’s no certainty that the appeal will work out in the tribes’ favor. However, even the stay order could throw serious complications into the FCC’s plans. It saw the tribal cuts as part of a larger strategy to reduce Lifeline subsidies across the board, ostensibly to cut costs — this would force it to maintain at least some of the broadband discounts and blunt the impact of its order. That could be good news for tribal populations that risked losing internet access, but it’s doubtful the <a href="https://www.engadget.com/2017/12/09/fcc-chairman-jokes-about-being-verizon-shill/">current FCC leadership</a> will see things their way.</p> TechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-31160984784926669932018-08-13T18:31:00.001-07:002018-08-13T18:31:46.548-07:00iPhone X Puts Samsung Galaxy Note 9 to Shame in First BenchmarksTechDrhttp://www.blogger.com/profile/09564461081870009759noreply@blogger.com0tag:blogger.com,1999:blog-4921435860377132470.post-54928961808199377762018-08-13T17:26:00.001-07:002018-08-13T17:26:22.395-07:00Football Superstar Lionel Messi Wins His 33rd Title As Barcelona Wins Spanish Super Cup<div class="panel panel-primary marginb20 visible-xs" readability="7"><h3 class="panel-title"><span class="bold">Get Daily Updates In Email</span></h3></div><div class="blog-box-img thumbnail"><img alt="Football Superstar Lionel Messi Wins His 33rd Title As Barcelona Wins Spanish Super Cup" src="http://i1.wp.com/laughingcolours.com/wp-content/uploads/2018/08/39032126_2096562007273064_3801262712290279424_n.jpg?w=618" data-recalc-dims="1" /></div><p>Lionel Messi is known for his exceptional football game, for hidden charities and heart touching gestures of people around him.</p><p>Recently, Messi won his 33rd title with Barcelona on Sunday to become the most successful player in the Catalan club’s history. Barcelona beat Sevilla 2-1 in the Spanish Super Cup as Messi overtook Andres Iniesta, who had 32 titles when he left this summer for the Japanese league.</p><p><img class="" src="http://i2.wp.com/dj0j0ofql4htg.cloudfront.net/cms2/image_manager/uploads/News/278367/7/1504001501_eece3.jpg?resize=590%2C400&amp;ssl=1" data-recalc-dims="1" /></p><p><a href="https://dj0j0ofql4htg.cloudfront.net/cms2/image_manager/uploads/News/278367/7/1504001501_eece3.jpg" target="_blank" rel="nofollow">Image Source</a></p><p>The 21-year-old France winger, Ousmane Dembele, stunned Sevilla’sdefencee with a right-footed shot that hit the underside of the crossbar in the 78th minute. Barcelona goalkeeper Marc-Andre ter Stegen secured the win when he saved a penalty kick from Sevilla substitute Wissam Ben Yedder in the 89th.</p><p>While Barcelona dominated possession, Sevilla went close to going back in front when Franco Vazquez’s glancing header hit the top of the goal-frame in the 62nd before Dembele took his winner.</p><p><img class="" src="http://i2.wp.com/images.indianexpress.com/2018/08/barcelona-sevilla-759.jpg?resize=580%2C322&amp;ssl=1" data-recalc-dims="1" /></p><p><a href="https://images.indianexpress.com/2018/08/barcelona-sevilla-759.jpg" target="_blank" rel="nofollow">Image Source</a></p><p>A year ago, Barcelona broke their own transfer record to sign Dembele from Borussia Dortmund in August for a fee of 105 million euros (now $120 million) that could rise to 147 million euros.</p><p>Barcelona coach Ernesto Valverde said that he hoped that Dembele’s goal is a sign of better things to come this season. “We have placed lots of hope (in Dembele),” Valverde said. “He has an amazing ability to break down defenses with his speed. He is a very young player and we hope that little by little he makes progress.”</p><p><img class="alignnone wp-image-91533 size-large" src="http://i0.wp.com/laughingcolours.com/wp-content/uploads/2018/08/3ecbb18b7c28c582ec18fa7f50916877-622x350.png?resize=618%2C348" alt="" srcset="http://i0.wp.com/laughingcolours.com/wp-content/uploads/2018/08/3ecbb18b7c28c582ec18fa7f50916877-622x350.png?resize=618%2C348 622w, http://laughingcolours.com/wp-content/uploads/2018/08/3ecbb18b7c28c582ec18fa7f50916877.png 649w" sizes="(max-width: 622px) 100vw, 622px" data-recalc-dims="1" /></p><p><a href="https://cdn.newsapi.com.au/image/v1/3ecbb18b7c28c582ec18fa7f50916877?width=650" target="_blank" rel="nofollow">Image Source</a></p><p>The video assistant referee (VAR) was used for the first time in Spanish football on Sunday to award midfielder Pablo Sarabia with Sevilla’s opening goal against Barcelona in the Spanish Super Cup. The use of VAR was hailed as a success at the 2018 World Cup and has been approved for use in La Liga this season.</p><p>Stay tuned to Laughing Colours for the latest sports news and updates.</p><h6 class="margint10 marginb10">Published by Bhaumik Raja on 13 Aug 2018</h6> NewsDr.http://www.blogger.com/profile/03592442343100778982noreply@blogger.com0